Results 41 to 50 of about 33,844 (282)
Between the changing Industry 4.0 landscape and the rise of Industry 5.0, where human intelligence and intelligent machines work together, vast amounts of privacy-sensitive data are generated, processed, and exchanged, making them attractive targets of ...
Adib Habbal +4 more
doaj +1 more source
Joining Federated Learning to Blockchain for Digital Forensics in IoT
In present times, the Internet of Things (IoT) is becoming the new era in technology by including smart devices in every aspect of our lives. Smart devices in IoT environments are increasing and storing large amounts of sensitive data, which attracts a ...
Wejdan Almutairi, Tarek Moulahi
doaj +1 more source
Adaptive Laplace Mechanism: Differential Privacy Preservation in Deep Learning
In this paper, we focus on developing a novel mechanism to preserve differential privacy in deep neural networks, such that: (1) The privacy budget consumption is totally independent of the number of training steps; (2) It has the ability to adaptively ...
Dou, Dejing +3 more
core +1 more source
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego +10 more
wiley +1 more source
Privacy-preserving email forensics
AbstractIn many digital forensic investigations, email data needs to be analyzed. However, this poses a threat to the privacy of the individual whose emails are being examined and in particular becomes a problem if the investigation clashes with privacy laws.
Armknecht, Frederik, Dewald, Andreas
openaire +2 more sources
Privacy-Preserving Technologies [PDF]
AbstractThis chapter introduces privacy and data protection by design, and reviews privacy-enhancing techniques (PETs). Although privacy by design includes both technical and operational measures, the chapter focuses on the technical measures. First, it enumerates design strategies.
Josep Domingo-Ferrer +1 more
openaire +1 more source
Discovery and Targeted Proteomic Studies Reveal Striatal Markers Validated for Huntington's Disease
ABSTRACT Objective Clinical trials for Huntington's disease (HD) enrolling persons before clinical motor diagnosis (CMD) lack validated biomarkers. This study aimed to conduct an unbiased discovery analysis and a targeted examination of proteomic biomarkers scrutinized by clinical validation. Methods Cerebrospinal fluid was obtained from PREDICT‐HD and
Daniel Chelsky +8 more
wiley +1 more source
RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks
The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile social network (MSN) applications, which bring convenience to our daily life and, meanwhile, raise serious privacy concerns due to the potential disclosure risk of ...
Jinquan Zhang +3 more
doaj +1 more source
iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks [PDF]
Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/
Abdelzaher, Tarek F. +4 more
core
Rate-Privacy in Wireless Sensor Networks
This paper introduces the concept of rate privacy in the context of wireless sensor networks. Our discussion reveals that the concept indeed is of a great importance for the privacy preservation of such networks.
Derakhshi, H. +3 more
core +1 more source

